var-201307-0565
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cogent Datahub. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web server component's handling of HTTP headers. By sending an overlarge HTTP header, an attacker can overflow a fixed size stack buffer. This vulnerability allows for an attacker to execute arbitrary code in the context of the Datahub process. Cogent Real-Time Systems DataHub is a set of real-time data system integration suite based on B / S architecture by Cogent Real-Time Systems of Canada. The kit includes tools such as DataHub WebView and DataHub QuickTrend. Cogent Real-Time Systems DataHub 7.3.0 vulnerabilities exist, other versions may also be affected. Failed exploit attempts will likely result in denial-of-service conditions
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "datahub", "scope": null, "trust": 0.7, "vendor": "cogent real time", "version": null }, { "_id": null, "model": "real-time systems cogent datahub", "scope": null, "trust": 0.6, "vendor": "cogent", "version": null }, { "_id": null, "model": "real-time systems", "scope": "eq", "trust": 0.2, "vendor": "cogent", "version": "*" }, { "_id": null, "model": "datahub", "scope": "eq", "trust": 0.2, "vendor": "cogent", "version": "*" } ], "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "CNVD", "id": "CNVD-2013-11044" } ] }, "credits": { "_id": null, "data": "Andrea Micalizzi aka rgod", "sources": [ { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "BID", "id": "61470" }, { "db": "CNNVD", "id": "CNNVD-201307-645" } ], "trust": 1.6 }, "cvss": { "_id": null, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "ZDI-13-178", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2013-11044", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "5d896002-1f14-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "ZDI", "id": "ZDI-13-178", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2013-11044", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "CNVD", "id": "CNVD-2013-11044" } ] }, "description": { "_id": null, "data": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cogent Datahub. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web server component\u0027s handling of HTTP headers. By sending an overlarge HTTP header, an attacker can overflow a fixed size stack buffer. This vulnerability allows for an attacker to execute arbitrary code in the context of the Datahub process. Cogent Real-Time Systems DataHub is a set of real-time data system integration suite based on B / S architecture by Cogent Real-Time Systems of Canada. The kit includes tools such as DataHub WebView and DataHub QuickTrend. Cogent Real-Time Systems DataHub 7.3.0 vulnerabilities exist, other versions may also be affected. Failed exploit attempts will likely result in denial-of-service conditions", "sources": [ { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "CNVD", "id": "CNVD-2013-11044" }, { "db": "CNNVD", "id": "CNNVD-201307-645" }, { "db": "BID", "id": "61470" }, { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" } ], "trust": 2.16 }, "external_ids": { "_id": null, "data": [ { "db": "BID", "id": "61470", "trust": 1.5 }, { "db": "ZDI", "id": "ZDI-13-178", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2013-11044", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1915", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201307-645", "trust": 0.6 }, { "db": "IVD", "id": "5D896002-1F14-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "CNVD", "id": "CNVD-2013-11044" }, { "db": "BID", "id": "61470" }, { "db": "CNNVD", "id": "CNNVD-201307-645" } ] }, "id": "VAR-201307-0565", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-11044" } ], "trust": 1.5661290300000001 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-11044" } ] }, "last_update_date": "2022-05-17T01:48:04.631000Z", "patch": { "_id": null, "data": [ { "title": "Cogent Real-Time Systems has issued an update to correct this vulnerability.", "trust": 0.7, "url": "http://www.cogentdatahub.com/info/130712_zdi-can-1915_response.html" }, { "title": "Patch for Cogent Real-Time Systems DataHub Remote Stack Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/36556" } ], "sources": [ { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "CNVD", "id": "CNVD-2013-11044" } ] }, "references": { "_id": null, "data": [ { "trust": 0.7, "url": "http://www.cogentdatahub.com/info/130712_zdi-can-1915_response.html" }, { "trust": 0.6, "url": "http://www.zerodayinitiative.com/advisories/zdi-13-178/" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/61470" }, { "trust": 0.3, "url": "http://www.cogentdatahub.com/products/cogent_datahub.html" } ], "sources": [ { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "CNVD", "id": "CNVD-2013-11044" }, { "db": "BID", "id": "61470" }, { "db": "CNNVD", "id": "CNNVD-201307-645" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d", "ident": null }, { "db": "ZDI", "id": "ZDI-13-178", "ident": null }, { "db": "CNVD", "id": "CNVD-2013-11044", "ident": null }, { "db": "BID", "id": "61470", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201307-645", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2013-08-01T00:00:00", "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d", "ident": null }, { "date": "2013-07-26T00:00:00", "db": "ZDI", "id": "ZDI-13-178", "ident": null }, { "date": "2013-08-01T00:00:00", "db": "CNVD", "id": "CNVD-2013-11044", "ident": null }, { "date": "2013-07-26T00:00:00", "db": "BID", "id": "61470", "ident": null }, { "date": "2013-07-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-645", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2013-07-26T00:00:00", "db": "ZDI", "id": "ZDI-13-178", "ident": null }, { "date": "2013-08-01T00:00:00", "db": "CNVD", "id": "CNVD-2013-11044", "ident": null }, { "date": "2013-08-19T11:27:00", "db": "BID", "id": "61470", "ident": null }, { "date": "2013-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-645", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201307-645" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Cogent Real-Time Systems DataHub Remote Stack Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-11044" }, { "db": "BID", "id": "61470" }, { "db": "CNNVD", "id": "CNNVD-201307-645" } ], "trust": 1.7 }, "type": { "_id": null, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201307-645" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.